As many as 230 million stolen traditional passwords were registered despite meeting the standard requirements regarding their complexity (min. 8 characters, 1 capital letter, 1 digit, and a special character), according to Specops Breached Password Report z 2025 r. This means that the level of traditional security is insufficient and more effective protection tools are needed. Can a biometric password prove to be a more secure password? Absolutely yes!


Biometrics is one of the safer ways of logging in because it is based on biometric features of people such as face, eye pupil or voice. Biometric identifiers are unique to a given person and distinguish them from others.

The advantage of biometrics lies in its unrivaled accuracy and convenience. Unlike traditional methods such as passwords or PINs, which can be easily forgotten or stolen, biometric identifiers are inextricably linked to people. This inherent link between individuals and their biometric characteristics makes it much more difficult for unauthorized individuals to impersonate another person.


An example of secure login using biometrics is VoiceToken from BiometrIQ, a voice authentication tool that provides very strong, two-step authentication. We remind you how it is done.


When speaking words, the compliance of the read words (first level) with the pattern is verified as well as the biometric compliance of the speaker’s voice with his VoicePrint (second level).


Extremely high security is ensured by an algorithm for selecting words to be read, which reduces the possibility of guessing the sequence of words that will be displayed on the screen to almost zero. The Speech To Text (STT) mechanism combined with an innovative biometric engine guarantee high effectiveness, even in the case of attacks based on speech synthesis.

 More about VoiceToken

Are you ready for changes?


At the end of the year, Radio Lublin hosted an interesting program on network security. It covered, among others, issues related to digital identity, privacy and its protection, as well as the phenomenon of the rapidly growing amount of data on the Internet and the impact of this phenomenon on the development of tools, AI and the life of society. The conversation took place as part of the series “XX/XXI – a garden with forking paths”, and the participant of this inspiring conversation was Andrzej Tymecki, Managing Director of BiometrIQ. Below we share some selected statements that constitute a short summary of this meeting.

👉 The amount of data is growing incredibly fast. To illustrate the point, if we recorded the data produced in the world in one day onto DVDs and arranged them one by one, they would cover 106,000 km, which means their length would be enough to circle the Earth more than twice.

👉 The concept of privacy is constantly evolving as technology advances and new opportunities emerge. It is no longer just traditional personal data such as name, PESEL or address, but also photos and biometric features such as voice, finger touch, iris. This makes protecting privacy more and more difficult.

👉Nowadays, it is very easy to commit identity theft due to the advancement of technology and the development of AI. Protection against loss of privacy and identity theft forces caution when posting any content online.

👉The right to be forgotten, introduced into the GDPR Act in 2014, allows us to delete our data from the database.

👉Using advanced methods to protect recordings, e.g. using watermarks. may not be enough to protect against identity theft. What is needed is the good will of people on the other side (platform managers) who will verify the recordings in terms of their authenticity.

👉Procedures are a very important issue in ensuring safety. Procedures cannot be replaced by technology. Technology is supposed to support and facilitate their implementation.


👉 Data centers play a key role in terms of security, of which there are as many as 144 in Poland. The United States is undoubtedly a power in this respect, with approximately 5,300 facilities.

you can read about the program itself, as well as the entire series here